Catálogo de publicaciones - libros

Compartir en
redes sociales


Management of Convergence Networks and Services: 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006, Busan, Korea, September 27-29, 2006, Proceedings

Young-Tak Kim ; Makoto Takano (eds.)

En conferencia: 9º Asia-Pacific Network Operations and Management Symposium (APNOMS) . Busan, South Korea . September 27, 2006 - September 29, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-45776-3

ISBN electrónico

978-3-540-46233-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Security Approaches for Cluster Interconnection in a Wireless Sensor Network

Alexandre Gava Menezes; Carlos Becker Westphall

A wireless sensor network is a collection of devices limited in low-powered batteries, processing, communication bandwidth capabilities and low memory availability. Due to these constraints, most of security approaches used in wired networks cannot be applied directly in this environment. In this work, we present a hybrid protocol that treats the group key management scheme and the transparent cluster interconnection. The feasibility of this protocol was verified by simulation and we concluded that increasing the number of nodes in the network does not change the performance of the interconnection between any two clusters.

- Short Paper Session | Pp. 542-545

A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks

Tran Thanh Dai; Al-Sakib Khan Pathan; Choong Seon Hong

This paper proposes an efficient resource-optimal key pre-distribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two schemes with some modifications and combine our encoding scheme to get resource-efficiency and better security.

- Short Paper Session | Pp. 546-549

Intelligent Home Network Service Management Platform Design Based on OSGi Framework

Choon-Gul Park; Jae-Hyoung Yoo; Seung-Hak Seok; Ju-Hee Park; Hoen-In Lim

In this paper, we propose an open standard-based, intelligent service management platform that aims to provide a flexible and extensible platform for building intelligent home network services. To have greater flexibility and efficiency in managing home network services, we further propose an AAA proxy, a service provisioning, security agent, a sip proxy service, and others. We call this platform the IHSM (Intelligent Home Network Service Management) Platform, which consists of the ISMS (Intelligent Service Management System) and the ISMF (Intelligent Service Management Framework).

- Short Paper Session | Pp. 550-553

COPS-Based Dynamic QoS Support for SIP Applications in DSL Networks

Seungchul Park; Yanghee Choi

In this paper, several dynamic QoS solutions including Direct DiffServ, Admission-based Direct DiffServ, Indirect DiffServ, and Hybrid DiffServ are proposed to support largely emerging SIP-based P2P(Peer-to-Peer) and ASP(Application Service Provider) multimedia applications in DSL networks, most widely deployed as broadband access networks. The proposed solutions are designed to be based on standard COPS protocol which is simple and service-independent.

- Short Paper Session | Pp. 554-557

IP Traceback Algorithm for DoS/DDoS Attack

Hong-bin Yim; Jae-il Jung

DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do not support traceback to know attacker’s real location. Many methods to defend DoS/DDoS attack have been proposed. However these kinds of methods cause network overhead because they use many packets to reconstruct an attack path. In this paper we propose effective probability marking methods and a pushback algorithm to reduce network overhead.

- Short Paper Session | Pp. 558-561

An Open Service Platform at Network Edge

Dong-Hui Kim; Jae-Oh Lee

The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient service management and uniform deployment of personal services at network edges. In this paper, we propose the open service framework, which can be implemented as a platform for the personal service at network edges by using Open Pluggable Edge Service (OPES) concept. The proposed framework is composed of Databases, Policy Repository, Rule Manager, Policy Adapter, Admission Manager, Operations Support System (OSS) Adapter and OPES-based Service Delivery Manager for the deployment of personalized and QoS guaranteed services in a standard way. In order to perform the feasibility of this platform, we have implemented a simple example and shown some its results.

- Short Paper Session | Pp. 562-565

Hybrid Inference Architecture and Model for Self-healing System

Giljong Yoo; Jeongmin Park; Eunseok Lee

Distributed computing systems are continuously increasing in complexity and cost of managing, and system management tasks require significantly higher levels of autonomic management. In distributed computing, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, an inference model is required to recognize operating environments and predict error occurrence. In this paper, we proposed a hybrid inference model – ID3, Fuzzy Logic, FNN and Bayesian Network – through four algorithms supporting self-healing in autonomic computing. This inference model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. Therefore, correction of error prediction becomes possible. In this paper, a hybrid inference model is adopted to evaluate the proposed model in a self-healing system. In addition, inference is compared with existing research and the effectiveness is demonstrated by experiment.

- Short Paper Session | Pp. 566-569

A Node Management Tool for Dynamic Reconfiguration of Application Modules in Sensor Networks

Sunwoo Jung; Jaehyun Choi; Dongkyu Kim; Kiwon Chong

The configuration management of a sensor network composed of tens or up to thousands of nodes is difficult due to the limit of memory space and energy consumption. This paper presents an approach for dynamic reconfiguration of application modules in sensor networks based on Nano-Qplus. The version information from proposed methods is registered into NVSync (Nano-Qplus Version Synchronization), a node management tool. It dynamically reconfigures application modules on the nodes by synchronizing them with the node information map on the centralized repository. Our approach utilizes efficient usage of limited memory by systematically managing application modules of each node composed of sensor network. Additionally, it reduces unnecessary energy consumption by dynamic reconfiguration of application modules on the nodes. Therefore, it can flexibly deal with change of application environment of the node.

- Short Paper Session | Pp. 570-573

Path Hopping Based on Reverse AODV for Security

Elmurod Talipov; Donxue Jin; Jaeyoun Jung; Ilkhyu Ha; YoungJun Choi; Chonggun Kim

In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node and enhance data security is an important issue on Ad hoc networks. In this study, we provide a path hopping method based on reverse AODV (R-AODV). By reverse AODV, source node builds multipath to destination and adaptively hops available paths for data communications. Hopping paths can protect data from the intrusion of malicious nodes. We propose an analytic method to expect intrusion rate and a path hopping routing mechanism to implement simulation models using NS-2.

- Short Paper Session | Pp. 574-577

Mixing Heterogeneous Address Spaces in a Single Edge Network

Il Hwan Kim; Heon Young Yeom

The growth of IPv4 Internet has been facing the infamous IP address depletion barrier. In practice, typical IPv4 Internet edge networks can be expanded by incorporating private addresses and NAT devices.

In this paper, major limitations of NAT-expanded private networks are presented. Furthermore, a solution is proposed to encourage the mixed usage of private and public IP addresses in a single edge network domain. The solution comprises of two key ideas : super-subnet mask and shared NAT. Super-subnet mask removes the routing boundary between private and public hosts. Shared NAT saves public IP address resources by sharing them among several private networks. These ideas not only encourage the coexistence of heterogeneous address classes, but also lead to efficient sharing of global IP addresses.

- Short Paper Session | Pp. 578-581